• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 828
Next 10 →

Privacy Preserving Mining of Association Rules

by Alexandre Evfimievski, Ramakrishnan Srikant, Rakesh Agrawal, Johannes Gehrke , 2002
"... We present a framework for mining association rules from transactions consisting of categorical items where the data has been randomized to preserve privacy of individual transactions. While it is feasible to recover association rules and preserve privacy using a straightforward "uniform" ..."
Abstract - Cited by 332 (8 self) - Add to MetaCart
We present a framework for mining association rules from transactions consisting of categorical items where the data has been randomized to preserve privacy of individual transactions. While it is feasible to recover association rules and preserve privacy using a straightforward "

Providing Efficiency in Privacy-Preserving Mining

by Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa , 2003
"... ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract not found

A framework for high-accuracy privacy-preserving mining

by Shipra Agrawal, Jayant R. Haritsa - In Proceedings of the 21st IEEE International Conference on Data Engineering , 2005
"... To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual data records have been proposed recently. In this paper, we present FRAPP, a generalized matrix-theoretic framework of random perturbation, which facilitates a systematic approac ..."
Abstract - Cited by 71 (1 self) - Add to MetaCart
approach to the design of perturbation mechanisms for privacy-preserving mining. Specifically, FRAPP is used to demonstrate that (a) the prior techniques differ only in their choices for the perturbation matrix elements, and (b) a symmetric perturbation matrix with minimal condition number can

An Improved Privacy Preserving Mining over Centralized Databases

by Ch. Ajaykumar K. Prasadarao, M. Tech Student, Sr Assistant Professor
"... Abstract: Secure mining of association rule mining over horizontal databases is always an interesting research issue in the field of knowledge and data engineering. In horizontal partitioning or data bases, databases are integrated from various data holders or players for applying association rule ..."
Abstract - Add to MetaCart
mining over integrated database. In this paper we are proposing a privacy preserving mining approach with Improved LaGrange’s polynomial equation for secure key generation and Binary Matrix approach.

An Architecture for Privacy-preserving Mining of Client Information

by Murat Kantarcioglu, Jaideep Vaidya , 2002
"... Due to privacy concerns, clients of some services may not want to reveal their private information. Even in these situations, data mining is feasible without sacrificing user privacy. Prior approaches to this problem generally trade o# accuracy for security, without giving provable bounds on securit ..."
Abstract - Cited by 27 (6 self) - Add to MetaCart
on security. Alternatives to the randomization technique are required to enable accurate data mining while strictly preserving privacy. In this paper, we present a general architecture that enables privacypreserving mining of client information. Under some reasonable assumptions, we show that our methods

On Addressing Efficiency Concerns in Privacy-Preserving Mining

by Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa - PROC. OF 9TH INTL. CONF. ON DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA , 2004
"... Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage ..."
Abstract - Cited by 27 (2 self) - Add to MetaCart
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage

Privacy-Preserving Mining of Association Rules on Distributed Databases

by Chin-chen Chang, Jieh-shan Yeh, Yu-chiang Li
"... Data mining techniques can extract hidden but useful information from large databases. Most efficient approaches for mining distributed databases suppose that all of the data at each site can be shared. However, source transaction databases usually include very sensitive information. In order to obt ..."
Abstract - Add to MetaCart
-phase, privacy-preserving, distributed data mining scheme. It is based on the Kantarcioglu and Clifton’s Scheme (KCS) and reduces the quantities of global candidates that are encrypted and reduces the transmission load without raising the risk of itemsets leak in the first phase. Moreover, to increase

On Addressing Efciency Concerns in Privacy-Preserving Mining

by Shipra Agrawal, Vijay Krishnan, Jayant Haritsa, Shipra Agrawaly, Vijay Krishnanz, Jayant R. Haritsay , 2007
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

A Frame Work for Ontological Privacy Preserved Mining

by Geetha Mary A, Sriman Narayana, Iyengar N. Ch
"... Data Mining analyses the stocked data and helps in foretelling the future trends. There are different techniques by which data can be mined. These different techniques reveal different types of hidden knowledge. Using the right procedure of technique result specific patterns emerge. Ontology is a sp ..."
Abstract - Add to MetaCart
cannot be revealed, therefore security is the most important feature dealt in all technologies and work places. Data mining and Ontology techniques when integrated would capitulate an efficient system capable of selecting the appropriate algorithm for a data mining technique and privacy preserving

Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases ⋆ Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases Extended Abstract

by Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi
"... Abstract. Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of data mining-as-service. A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, ..."
Abstract - Cited by 17 (1 self) - Add to MetaCart
the extracted patterns received from the server. In this paper, we study the problem of outsourcing the association rule mining task within a corporate privacy-preserving framework. We propose a scheme for privacy preserving outsourced mining and show that the owner can recover the true patterns as well
Next 10 →
Results 1 - 10 of 828
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University